SQL Injection techniques

SQL Injection techniques

Security should be foremost on every database developer’s mind, and given a little thought and know-how, it’s not difficult to develop fairly secure code. The only trouble is that it’s VERY easy to develop code which can be exploited in some way, maybe with disastrous results.

This article isn’t about database security in general, that’s far too big a subject to cover in a few pages of XHTML, but about a specific issue which is probably the most common database and application exploit.

發表迴響

你的電子郵件位址並不會被公開。 必要欄位標記為 *

What is 15 + 5 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)